Forensic Monitoring System

Size: px
Start display at page:

Download "Forensic Monitoring System"

Transcription

1 Forensic Monitoring System Technical Report September 2007 Number W0702 Chuah Siang Chee American Institute of CPAs

2 Copyright 2007 by American Institute of Certified Public Accountants, Inc. Forensic Monitoring System 1

3 Forensic Monitoring System Chuah Siang Chee The Forensic Monitoring project was charted with developing a system to identify test items that may have been compromised, and thereby endanger the integrity of the Uniform CPA Examination. This is be done primarily by monitoring the proportion of correct responses for each item across testing windows. This will allow us to monitor the performance of items across time and to identify unusual fluctuations in item performance. If the proportion of correct responses is above and beyond the expected response rate, it would trigger further investigation into the integrity of the items. This would allow us to make a decision on retiring the item from the item pool. Forensic analysis is conducted on the multiple-choice items and simulation items for all sections of the Uniform CPA Examination. The Uniform CPA Examination consists of four sections: audit and attestation (AUD), financial accounting and reporting (FAR), regulation (REG), and business environment and concepts (BEC). Three of the sections (AUD, FAR, and REG) consist of an adaptive multi-stage test (MST) for the multiple choice items, two simulation items, and constructed response items. The BEC currently has multiple choice items that are not administered using an adaptive algorithm. There are no simulation items associated with the BEC presently. Forensic Monitoring System 2

4 Description of System This system was built on a Microsoft Access platform. It combines historical data across all previously administered CBT administrations of the Uniform CPA Examination. Initial data processing is done using SAS to generate text files which are then loaded on the Microsoft Access database. Currently, new data for each window is appended to the database at the end of each test window. The Forensic Monitoring system tracks the proportion of examinees that correctly answer a particular item, or p-value. However, natural fluctuations in the abilities of examinees across test windows as well as restriction of range for multiple choice items because of the adaptive administration confound direct assessment of the proportion correct scores. In order to resolve these limitations, the observed proportion correct scores is contrasted with the expected proportion correct scores in order to determine if scores are within tolerances. The expected proportion correct score is calculated based on the IRT parameters and conditional upon the ability level of the examinee administered the specific test item. Difference scores from the expected minus the observed proportion correct scores allow us to control for natural fluctuations in examinee ability and the range restrictions from multi-stage testing. If ability-adjusted difference scores are not used, the tolerance levels would require a wide range, or increase risk of false positives would occur. This would in turn reduce the sensitivity of the forensic monitoring system to detect security breaches. Data in the Forensic Monitoring System is partitioned according to months. Each test window consists of two months of testing before the item pool is replaced. The rationale for this decision was to detect if examinees might be harvesting items at the beginning of a test window Forensic Monitoring System 3

5 and distributing the information to conspirators later in the test window. By partitioning the first and second month of testing, the system would be able to detect significant compromises in the security of the test if such a situation were to occur. Identification of Suspect Items Identification of suspect items in the Forensic Monitoring software currently requires human interpretation. There are no strict rules as to what dictates a suspect item, we have several constrains proposed for identifying suspect items. 1. Real p-values are significantly higher than expected p-values. 2. Sustained increase of real p-values over expected p-values three or more testing windows. 3. Significant increase in real p-values in the second month of test window. Several charts are provided to track the performance of a particular item across windows. These charts include the expected and observed p-value Also included is the standard error of the p-value. This allows the number of examinees to be taken into consideration when interpretation results and serves as a guide in interpreting if there are significant differences between the expected and observed p-value. The process of identifying suspect items is time consuming because each item must be individually inspected. In order to improve efficiency the Forensic Monitoring software provides several statistics to restrict the list of potential items. These include: 1. The absolute size of the fluctuations in the observed p-value. If there is excessive fluctuation, it may indicate that something has occurred to compromise or change the item from previous administrations. Forensic Monitoring System 4

6 2. The absolute size of the fluctuations in the difference between the expected and observed p-value. This is akin to fluctuations of the observed p-value, but takes into account the fluctuations of ability of examinees. 3. The difference between the expected and the observed p-value for the last window the item was administered in. This is provided in order to limit searches to the current or latest test window. 4. The difference between the first window difference score (which is the difference between expected and observed p-value) and the last window difference score, in which the item was administered. Below are samples of the charts available to interpretation. Figure 1 shows the difference between the expected and observed p-value, and standard error of an item across several test windows. Each data point represents a month of testing. Therefore, 05Q21 represents the first month of testing for the second quarter for the year As we can see from the chart, the difference between the expected and observed p-values is generally within a standard error. There does not appear to be a significant difference between the expected and observed p-value in the example given. Figure 1. Difference Between Expected and Observed P-value and Standard Error of a Test Item by Window Diff Pval Standard Error P-Value Diff Q21 04Q31 04Q41 05Q11 05Q21 05Q31 05q41 Window Forensic Monitoring System 5

7 Figure 2 shows the expected and observed p-value for a test item across test windows. There does not appear to be a significant deviation between the expected and observed p-value. Interpretation of the observed without the inclusion of the expected p-value would be difficult because the p-value fluctuates considerably in this example. Therefore, including the expected p- value is an important instrument for interpreting results for the Forensic Monitoring system. Figure 2. The Expected P-value and observed P-value of a Test Item by Window PVal Expected P P-Value Q21 04Q31 04Q41 05Q11 05Q21 05Q31 05q41 Window The Forensic Monitoring system is currently operational. Analysis of the results beginning 04Q2 to the last completed window (05Q4) is complete. Results suggest that there are no significant compromises in test security. A small number of items have been flagged as suspect items, 4 items out of the item pool. Figure 3 illustrates the performance of a particular item that has been identified as suspect. There appears to be a slight increase in the proportion of examinees correctly answering the item over time. Forensic Monitoring System 6

8 Figure 3. Difference Between Expected and Observed P-value and Standard Error of a Suspect Test Item Diff Pval Standard Error P-Value Diff Q31 04Q32 04Q41 04Q42 05Q11 05Q12 05Q31 05Q32 Window However, such small fluctuations do not necessarily mean that the item has been compromised. The p-value is expected to fluctuate to a small degree across windows. In addition, the small number of items that were flagged as suspect items suggests that there is currently no significant compromise to the security of the test. Other Applications In addition identifying items that may be compromised the Forensic Monitoring program has other potential applications. These include the ability to identify items where the current accounting rules pertaining to that item may have changed or to identify inconsistencies between item parameters and data. The Uniform CPA Examination is based on governmental rules that frequently change. Consequently, there is a need to actively perform obsolescence analysis of Forensic Monitoring System 7

9 the items in order to assure that the examination has kept up with the code. If there has been a change and the keyed response is no longer correct, the item statistics for that item might reflect this discrepancy. The system could also be used to study the lifecycle of the item. Indications that an item properties change over time might inform policy decisions about item use and retirement. Schedule of Analysis It is proposed that the Forensic Monitoring analysis be run at the completion of each testing window. This is the most opportune to run the analysis because all item parameters and statistics will be available. It is also the soonest that the analysis can be conducted. Conducting the analysis in the middle of the test window, before the completion of the window would exclude items that might not have their final item parameters. Procedural Recommendations For the Forensic Monitoring program to be effective, there need to be procedures in place to respond once items have been flagged as behaving suspiciously. Below are several recommendations for procedures. Having a second psychometrician to evaluate items already flagged as being suspicious. The identification of suspect items is a subjective process, and having concurrence should improve the process. Once an item is flagged as suspicious, a test developer should review the identified item in order to determine if there is a reason for the behavior of the item statistics. If no Forensic Monitoring System 8

10 acceptable reason can explain the item behavior, the status of the item should be escalated in order to determine an appropriate response. Once an item s status has been escalated, a process needs to be in place to retire an item, or in the extreme case, to not score the item. In order to implement such a process, a senior manager should be designated with the task of approving the decision to permanently/temporarily retire an item, or not to score the item. The procedure also requires that the personnel from content and production be informed if an item has been retired from the item pool. Accordingly, if an item is marked as a do not score, the appropriate personnel from production need to be informed to make the necessary changes to the scoring algorithm. Future Enhancements Future enhancements under development include the analysis by test center. This would enable the system to detect conspiracies that are localized to certain areas or districts. The rationale is that, if there is a local organization that has somehow compromised the security of the test, many of the students would be geographically close. Consequently, test scores for a local test center should be higher than surrounding areas. One current shortcoming of the system is its inability to identify individual examinees that might be cheating. Research is currently under consideration in order to determine a manner in which individual cheaters might be identified. Forensic Monitoring System 9

Summary of Uniform CPA Examination Candidate Test-Taking and Pass-Fail Patterns in the First Ten Windows of Computer-Based Testing (CBT) (04Q2-06Q3)

Summary of Uniform CPA Examination Candidate Test-Taking and Pass-Fail Patterns in the First Ten Windows of Computer-Based Testing (CBT) (04Q2-06Q3) Summary of Uniform CPA Examination Candidate Test-Taking and Pass-Fail Patterns in the First Ten Windows of Computer-Based Testing (CBT) (04Q2-06Q3) Technical Report September 2007 Number W0705 Yanwei

More information

TO KNOW TO BECOME A CPA IN INDIANA

TO KNOW TO BECOME A CPA IN INDIANA WHAT YOU NEED TO KNOW TO BECOME A CPA IN INDIANA The CPA Exam will be one of the most challenging tests you will take. But with a solid educational foundation, excellent resources and the dedication to

More information

LOGIC SCHOOL OF INTERNATIONAL STUDIES The online wing of LOGIC Group customized for the interest of Global Online Students.

LOGIC SCHOOL OF INTERNATIONAL STUDIES The online wing of LOGIC Group customized for the interest of Global Online Students. LOGIC SCHOOL OF INTERNATIONAL STUDIES The online wing of LOGIC Group customized for the interest of Global Online Students. Logic is an Authorised Partner of IMA & WILEY. 1 CPA exam is conducted by American

More information

CPA. Certified Public Accountant. Handbook

CPA. Certified Public Accountant. Handbook CPA Certified Public Accountant Handbook CPA Certified Public Accountant What is a CPA A CPA is a certified public accountant who is licensed by a state board of accountancy. To earn the prestige associated

More information

Detecting Cheating in Computer Adaptive Tests Using Data Forensics. James C. Impara, Caveon, Caveon, LLC. Gage Kingsbury, NWEA

Detecting Cheating in Computer Adaptive Tests Using Data Forensics. James C. Impara, Caveon, Caveon, LLC. Gage Kingsbury, NWEA Detecting Cheating in Computer Adaptive Tests Using Data Forensics James C. Impara, Caveon, Caveon, LLC Gage Kingsbury, NWEA Dennis Maynes and Cyndy Fitzgerald, Caveon, LLC Key Words: Test security, detecting

More information

Maintaining the Relevance of the Uniform CPA Examination

Maintaining the Relevance of the Uniform CPA Examination Invitation to Comment Maintaining the Relevance of the Uniform CPA Examination Issued: September 2, 2014 Comments Due: December 2, 2014 AICPA Board of Examiners Please submit all comments via the online

More information

The relationship between 150-credit hours, accounting credit hours and CPA pass rates

The relationship between 150-credit hours, accounting credit hours and CPA pass rates The relationship between 150-credit hours, accounting credit hours and CPA pass rates ABSTRACT Jason Haen St. Norbert College Amy Spielbauer-Vandenberg St. Norbert College Ariel Bloniarz St. Norbert College

More information

CERTIFIED PUBLIC ACCOUNTANT (CPA)

CERTIFIED PUBLIC ACCOUNTANT (CPA) CERTIFIED PUBLIC ACCOUNTANT (CPA) Certified Public Accountant (CPA) is the highest accounting qualification in the United States of America. One has to pass the Uniform CPA Examination conducted by the

More information

Performance of HBCUs on the CPA examination for the year 2010

Performance of HBCUs on the CPA examination for the year 2010 ABSTRACT Performance of HBCUs on the CPA examination for the year 2010 Forrest Thompson Albany State University There are over one-hundred Historically Black Colleges and Universities (HBCUs) in the United

More information

M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION

M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION 2015/2016 CPA CERTIFICATION THE FUTURE IS SO BRIGHT THE CPA CREDENTIAL WHY IT S IMPORTANT CPAs are taking care of business in every industry and there

More information

Concerning the Start of the Certified Public Accountants and Auditing Oversight Board

Concerning the Start of the Certified Public Accountants and Auditing Oversight Board Concerning the Start of the Certified Public Accountants and Auditing Oversight Board Chairman of the Certified Public Accountants and Auditing Oversight Board Akira Kaneko 1. Introduction Due to rapid

More information

MAP YOUR WAY TO CPA. What you need to know to become a CPA in Indiana.

MAP YOUR WAY TO CPA. What you need to know to become a CPA in Indiana. MAP YOUR WAY TO CPA What you need to know to become a CPA in Indiana. IRST The CPA Exam will be one of the most challenging tests you will take. But with a solid educational foundation, excellent resources

More information

Become a CPA. in New Hampshire

Become a CPA. in New Hampshire Become a CPA in New Hampshire 1 Get to know these organizations they ll help you become a CPA. The National Association of State Boards of Accountancy (NASBA) NASBA is the central clearinghouse for the

More information

Overview & Facts Everything you need to know about sitting for the Uniform CPA Exam as an Illinois Candidate.

Overview & Facts Everything you need to know about sitting for the Uniform CPA Exam as an Illinois Candidate. Overview & Facts Everything you need to know about sitting for the Uniform CPA Exam as an Illinois Candidate. Revised 6.3.15 Overview: The information provided in this brochure is intended to inform Illinois

More information

Become a CPA. in Pennsylvania. www.picpa.org/cpaexam

Become a CPA. in Pennsylvania. www.picpa.org/cpaexam Become a CPA in Pennsylvania 1 Get to know these organizations they ll help you become a CPA. The National Association of State Boards of Accountancy (NASBA) NASBA is the central clearinghouse for the

More information

Local outlier detection in data forensics: data mining approach to flag unusual schools

Local outlier detection in data forensics: data mining approach to flag unusual schools Local outlier detection in data forensics: data mining approach to flag unusual schools Mayuko Simon Data Recognition Corporation Paper presented at the 2012 Conference on Statistical Detection of Potential

More information

MICPA. Guide to Becoming A Michigan CPA. Education Examination Experience. Learn more. Sponsored in part by:

MICPA. Guide to Becoming A Michigan CPA. Education Examination Experience. Learn more. Sponsored in part by: MICPA Guide to Becoming A Michigan CPA Education Examination Experience Sponsored in part by: Learn more The 3 E-ssentials for becoming a CPA in Michigan Education + Examination + Experience = MI CPA Completing

More information

MEMBER REGULATION NOTICE SUITABILITY

MEMBER REGULATION NOTICE SUITABILITY Contact: Ken Woodard Director, Communications and Membership Services Phone: (416) 943-4602 Email: kwoodard@mfda.ca MR-0069 April 14, 2008 (Revised February 22, 2013) MEMBER REGULATION NOTICE SUITABILITY

More information

cpa exam FAQs FREQUENTLY ASKED QUESTIONS CPA EXAM REVIEW

cpa exam FAQs FREQUENTLY ASKED QUESTIONS CPA EXAM REVIEW cpa exam FAQs FREQUENTLY ASKED QUESTIONS CPA EXAM REVIEW applying, scheduling and sitting for the cpa exam HOW DO I APPLY FOR THE CPA EXAM? Detailed information on how to apply, including state-by-state

More information

Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures. December 2005

Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures. December 2005 Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures December 2005 Copyright 2005 Investment Company Institute. All rights reserved. Information may be abridged and therefore

More information

Development and Validation of the National Home Inspector Examination

Development and Validation of the National Home Inspector Examination Development and Validation of the National Home Inspector Examination Examination Board of Professional Home Inspectors 800 E. Northwest Hwy. Suite 708 Palatine Illinois 60067 847-298-7750 info@homeinspectionexam.org

More information

QUALITY MANAGEMENT SYSTEM REQUIREMENTS

QUALITY MANAGEMENT SYSTEM REQUIREMENTS QUALITY MANAGEMENT SYSTEM REQUIREMENTS FOR BUILDERS 2014 400 Prince George s Blvd. Upper Marlboro, MD 20774 800.638.8556 HomeInnovation.com TABLE OF CONTENTS Introduction... iii Notes... iii 1 General...1

More information

Comparison of AACSB Accounting Accredited and AACSB Business Accredited Institutions Using the CPA Examination as a Post-Curriculum Assessment

Comparison of AACSB Accounting Accredited and AACSB Business Accredited Institutions Using the CPA Examination as a Post-Curriculum Assessment Comparison of AACSB Accounting Accredited and AACSB Business Accredited Institutions Using the CPA Examination as a Post-Curriculum Assessment Randall B. Bunker Murray State University Corey S. Cagle University

More information

Census 2001 Review and Evaluation

Census 2001 Review and Evaluation Census 2001 Review and Evaluation November 2003 Data Validation: Executive Summary ONS is carrying out a review and evaluation of the 2001 Census in England and Wales which will culminate in a Data Quality

More information

Continuous Monitoring: Match Your Business Needs with the Right Technique

Continuous Monitoring: Match Your Business Needs with the Right Technique Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous

More information

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative

More information

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity

More information

Pension & Health Benefits Committee California Public Employees Retirement System

Pension & Health Benefits Committee California Public Employees Retirement System California Public Employees Retirement System Agenda Item 8 ITEM NAME: Customer Services and Support Performance Update PROGRAM: Customer Services and Support ITEM TYPE: Information EXECUTIVE SUMMARY Delivering

More information

What You Need to Know About CELDT Security Forms

What You Need to Know About CELDT Security Forms TITLE: NUMBER: ISSUER: CELDT Training for Principals and Coordinators and Electronic Submission of Test Security Forms for 2015-16 Cynthia Lim, Executive Director Office of Data and Accountability ROUTING

More information

THE ARIZONA STATE BOARD OF ACCOUNTANCY

THE ARIZONA STATE BOARD OF ACCOUNTANCY Print Form THE ARIZONA STATE BOARD OF ACCOUNTANCY INFORMATION FOR RE-EXAM APPLICANTS FOR THE UNIFORM CPA EXAMINATION The Arizona State Board of Accountancy (Board) and the National Association of State

More information

Bank Secrecy Act Anti-Money Laundering Examination Manual

Bank Secrecy Act Anti-Money Laundering Examination Manual Bank Secrecy Act Anti-Money Laundering Examination Manual Core Overview - Customer Identification Program Assess the bank's compliance with the statutory and regulatory requirements for the Customer Identification

More information

Department of Accounting & Finance Academic Year 2014-15 Assessment Report

Department of Accounting & Finance Academic Year 2014-15 Assessment Report Office of the Provost and Vice President for Academic Affairs Department of Accounting & Finance Academic Year 2014-15 Assessment Report MISSION STATEMENT The Department of Accounting and Finance prepares

More information

STATE OF RHODE ISLAND AND PROVIDENCE PLANTATIONS. BOARD OF ACCOUNTANCY 1511 Pontiac Avenue, #68-1 Cranston, Rhode Island 02920

STATE OF RHODE ISLAND AND PROVIDENCE PLANTATIONS. BOARD OF ACCOUNTANCY 1511 Pontiac Avenue, #68-1 Cranston, Rhode Island 02920 BOARD OF ACCOUNTANCY Cranston, Rhode Island 02920 APPLICATON FOR CPA CERTIFICATE WITHOUT WRITTEN EXAMINATION To the Rhode Island Board of Accountancy: I hereby make application to be examined by the Rhode

More information

2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS

2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS 2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS By AICPA Students, Academics & Inclusion CX Act Copyright 2015 American Institute of CPAs. All right reserved.

More information

European Code for Export Compliance

European Code for Export Compliance European Code for Export Compliance EU-CEC European Institute For Export Compliance EU-ECF EU Export Compliance Framework: EU Export Compliance Charter The European Code for Export Compliance EU-CEC 1.

More information

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,

More information

Safe Passage Online Training Overview. Objectives

Safe Passage Online Training Overview. Objectives Safe Passage Online Training Overview Copyright 2012 Safe Passage International, Inc. All rights reserved. Identify the features and benefits of the Safe Passage Training Management System (TMS). Explain

More information

A RESOLUTION OF THE CITY COUNCILOF THE CITY OF CASTLE PINES, COLORADO ADOPTING A POLICY PERTAINING TO IDENTITY THEFT PREVENTION

A RESOLUTION OF THE CITY COUNCILOF THE CITY OF CASTLE PINES, COLORADO ADOPTING A POLICY PERTAINING TO IDENTITY THEFT PREVENTION RESOLUTION NO.ll-34 A RESOLUTION OF THE CITY COUNCILOF THE CITY OF CASTLE PINES, COLORADO ADOPTING A POLICY PERTAINING TO IDENTITY THEFT PREVENTION WHEREAS, the Federal Trade Commission has adopted new

More information

TRENDS. 2013 TRENDS a

TRENDS. 2013 TRENDS a 2013 TRENDS in the supply of Accounting Graduates and the Demand for Public Accounting Recruits 2013 TRENDS a By Scott Moore Director, Student and Professional Pathways Academic & Career Awareness TARP

More information

DATA AUDIT: Scope and Content

DATA AUDIT: Scope and Content DATA AUDIT: Scope and Content The schedule below defines the scope of a review that will assist the FSA in its assessment of whether a firm s data management complies with the standards set out in the

More information

Testing Integrity Practices and Procedures for Online and

Testing Integrity Practices and Procedures for Online and Testing Integrity Practices and Procedures for Online and Computer based Assessments Wayne J. Camara The College Board NCES Sponsored Symposium ontesting Integrity 2/28/2012 CBT vs Paper Online testing

More information

Questions and Answers About the Identity Theft Red Flag Requirements

Questions and Answers About the Identity Theft Red Flag Requirements Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,

More information

Asset management firms and the risk of market abuse

Asset management firms and the risk of market abuse Financial Conduct Authority Asset management firms and the risk of market abuse February 2015 Thematic Review TR15/1 TR15/1 Asset management firms and the risk of market abuse Contents 1. Executive summary

More information

Facts About FACTA Red Flag Identity Theft Prevention Program

Facts About FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015

HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015 HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard on Auditing 500

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

BOARD OF NURSE EXAMINERS FOR THE STATE OF TEXAS 333 GUADALUPE STREET, SUITE 3-460 AUSTIN, TX 78701

BOARD OF NURSE EXAMINERS FOR THE STATE OF TEXAS 333 GUADALUPE STREET, SUITE 3-460 AUSTIN, TX 78701 BOARD OF NURSE EXAMINERS FOR THE STATE OF TEXAS 333 GUADALUPE STREET, SUITE 3-460 AUSTIN, TX 78701 Criteria for Evaluation of National Certification Examinations for Recognition from the Board of Nurse

More information

Get. Get. Career Ready.

Get. Get. Career Ready. Get CPA READY. Get Career Ready. The Fox Master of Accountancy If you aspire to become a CPA, the Fox one-year Master of Accountancy (MAcc) program is your bridge to a career in public accounting. We

More information

Optimizing Data Validation!

Optimizing Data Validation! Paper DH03 Optimizing Data Validation! Andrew Newbigging, Medidata Solutions Worldwide, London, United Kingdom ABSTRACT Much effort goes into the specification, development, testing and verification of

More information

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

RESOLUTION TO ADOPT IDENTITY THEFT POLICY RESOLUTION TO ADOPT IDENTITY THEFT POLICY WHEREAS, in late 2008 the Federal Trade Commission (FTC) and federal banking agencies issued a regulation known as the Red Flag Rule under sections 114 and 315

More information

Reporting on Controls at a Service Organization

Reporting on Controls at a Service Organization Reporting on Controls at a Service Organization 1529 AT Section 801 Reporting on Controls at a Service Organization (Supersedes the guidance for service auditors in Statement on Auditing Standards No.

More information

Attachment-VEE STANDARDS FOR VALIDATING, EDITING, AND ESTIMATING MONTHLY AND INTERVAL DATA

Attachment-VEE STANDARDS FOR VALIDATING, EDITING, AND ESTIMATING MONTHLY AND INTERVAL DATA Attachment-VEE STANDARDS FOR VALIDATING, EDITING, AND ESTIMATING MONTHLY AND INTERVAL DATA This Page Intentionally Left Blank Table of Contents SECTION A: CA INTERVAL DATA VEE RULES 1. INTRODUCTION...

More information

Number: 56.300. Index

Number: 56.300. Index Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND

More information

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction

More information

Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors)

Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors) HKSA 600 Issued September 2009; revised July 2010, May 2013, June 2014*, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard

More information

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office: 2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA INFORMATION SYSTEMS AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY GENERAL CONTROLS OCTOBER 2014 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR

More information

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)

More information

Boosting enterprise security with integrated log management

Boosting enterprise security with integrated log management IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise

More information

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead

More information

GUIDELINES INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL STATEMENT AUDITS OF STATE AGENCIES

GUIDELINES INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL STATEMENT AUDITS OF STATE AGENCIES GUIDELINES TO INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL STATEMENT AUDITS OF STATE AGENCIES STATE AUDITOR Robert R. Peterson 1 GUIDELINES TO CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL

More information

2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS

2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS 2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS By AICPA Students, Academics & Inclusion CX Act Copyright 2015 American Institute of. All right reserved.

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes

More information

Wolfsberg Statement on AML Screening, Monitoring and Searching (2009)

Wolfsberg Statement on AML Screening, Monitoring and Searching (2009) Wolfsberg Statement on AML Screening, Monitoring and Searching (2009) 1. Introduction The Wolfsberg Group 1 issued its initial paper examining how financial institutions could develop suitable screening,

More information

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority. Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade

More information

Security Services and Investigators Act Provincial Examination Process

Security Services and Investigators Act Provincial Examination Process Upon completion of an approved or accredited basic security or investigator training course in Alberta, applicants must pass a provincially-administered final exam with a score of not less than 80% in

More information

CERTIFIED PUBLIC ACCOUNTANTS

CERTIFIED PUBLIC ACCOUNTANTS The Uniform Audit and Accounting Guide for Audits of Architecture and Engineering (A/E) Consulting Firms CERTIFIED PUBLIC ACCOUNTANTS Today s Presenters James A. DeLeo, CPA, MBA, MST Gray, Gray & Gray,

More information

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot

More information

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Covered Areas: Those EVMS departments that have activities with Covered Accounts. I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with

More information

INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE

INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE PREFERRED RELIABILITY PRACTICES PRACTICE NO. PD-ED-1228 PAGE 1 OF 6 INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE Practice: To produce high quality, reliable software, use Independent Verification

More information

FFIEC BSA/AML Examination Manual. Four Key Components of a Suspicious Activity Monitoring Program

FFIEC BSA/AML Examination Manual. Four Key Components of a Suspicious Activity Monitoring Program FFIEC BSA/AML Examination Manual Four Key Components of a Suspicious Activity Monitoring Program 1 2 IDENTIFICATION OF SUSPICIOUS ACTIVITY 3 Unusual Activity Identification Employee Identification Law

More information

RULE 3 EXAMINATIONS (Effective July 18, 2013)

RULE 3 EXAMINATIONS (Effective July 18, 2013) RULE 3 EXAMINATIONS (Effective July 18, 2013) 3.1 SEMESTER HOUR; ACCREDITED COLLEGES, UNIVERSITIES, SCHOOLS AND PROGRAMS; CREDIT FOR COURSES (a) As used in these Rules, a semester hour means the conventional

More information

SMALL BUSINESS QUARTERLY PULSE CHECK

SMALL BUSINESS QUARTERLY PULSE CHECK SMALL BUSINESS QUARTERLY PULSE CHECK To make your business #CPAPOWERED, call today and let s get started. 16733-312_CPAPowered_Quarterly Pulse_Check Checklist_final.indd 1 Sound planning is one of the

More information

Selling Telematics Motor Insurance Policies. A Good Practice Guide

Selling Telematics Motor Insurance Policies. A Good Practice Guide Selling Telematics Motor Insurance Policies A Good Practice Guide April 2013 1 INTRODUCTION 1.1 The purpose of the guidance This guidance sets out high-level actions that insurers should seek to achieve

More information

Solvency II Data audit report guidance. March 2012

Solvency II Data audit report guidance. March 2012 Solvency II Data audit report guidance March 2012 Contents Page Introduction Purpose of the Data Audit Report 3 Report Format and Submission 3 Ownership and Independence 4 Scope and Content Scope of the

More information

THE AUDITOR S RESPONSES TO ASSESSED RISKS

THE AUDITOR S RESPONSES TO ASSESSED RISKS SINGAPORE STANDARD ON AUDITING SSA 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS This revised Singapore Standard on Auditing (SSA) 330 supersedes SSA 330 The Auditor s Procedures in Response to Assessed

More information

STATEMENT FROM THE CHAIRMAN

STATEMENT FROM THE CHAIRMAN STATEMENT FROM THE CHAIRMAN In an ever-changing global marketplace, it is important for all of us to have an understanding of the responsibilities each of have in carrying out day-to-day business decisions

More information

Code of Professional Responsibilities in Educational Measurement

Code of Professional Responsibilities in Educational Measurement Code of Professional Responsibilities in Educational Measurement Prepared by the NCME Ad Hoc Committee on the Development of a Code of Ethics: Cynthia B. Schmeiser, ACT--Chair Kurt F. Geisinger, State

More information

ediscovery Solution for Email Archiving

ediscovery Solution for Email Archiving ediscovery Solution for Email Archiving www.sonasoft.com INTRODUCTION Enterprises reliance upon electronic communications continues to grow with increased amounts of information being shared via e mail.

More information

Description of the ICTS Standard Setting Process ILLINOIS CERTIFICATION TESTING SYSTEM (ICTS) 1

Description of the ICTS Standard Setting Process ILLINOIS CERTIFICATION TESTING SYSTEM (ICTS) 1 Description of the ICTS Standard Setting Process 1 ICTS Test of Academic Proficiency Illinois students are required to pass the ICTS TAP as a prerequisite to entering an Illinois educator preparation program.

More information

Electronic Health Records (EHR) Demonstration Frequently Asked Questions

Electronic Health Records (EHR) Demonstration Frequently Asked Questions Demo Goals / Objectives 1. What is the Electronic Health Records Demonstration, and why are you doing it? The Electronic Health Records Demonstration is a five-year demonstration project that will encourage

More information

Maryland Board of Public Accountancy CPA Examination Application Process (August 1, 2012)

Maryland Board of Public Accountancy CPA Examination Application Process (August 1, 2012) Maryland Board of Public Accountancy CPA Examination Application Process (August 1, 2012) This report has been prepared to review the CPA examination process administered by the Board of Public Accountancy

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

University of Nebraska - Lincoln Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program I. Purpose & Scope This program was developed pursuant to the Federal Trade Commission s (FTC) Red Flag Rules promulgated pursuant to the Fair and Accurate Credit Transactions Act (the FACT Act). The University

More information

General Rules for the Certification of Management Systems Code: RG

General Rules for the Certification of Management Systems Code: RG General Rules for the Certification of Management Systems Code: RG Drafted on: 1 April 2012 Effective from: 1 October 2012 TABLE OF CONTENTS CHAPTER TITLE PAGE CHAPTER 1 GENERAL 3 CHAPTER 2 REFERENCE STANDARD

More information

ETHICS EDUCATION IN U. S. ACCOUNTING PRACTICE A STATUS REPORT

ETHICS EDUCATION IN U. S. ACCOUNTING PRACTICE A STATUS REPORT Allied Academies International Conference page 7 ETHICS EDUCATION IN U. S. ACCOUNTING PRACTICE A STATUS REPORT Homer L. Bates, University of North Florida Bobby E. Waldrup, University of North Florida

More information

FinCEN s Proposed Anti-Money Laundering Compliance Requirements for Investment Advisers: How to Prepare Now

FinCEN s Proposed Anti-Money Laundering Compliance Requirements for Investment Advisers: How to Prepare Now FinCEN s Proposed Anti-Money Laundering Compliance Requirements for Investment Advisers: How to Prepare Now I. INTRODUCTION On August 25, 2015, the Financial Crimes Enforcement Network ( FinCEN ) proposed

More information

Assessment Plan Undergraduate Major in Accounting J. M. Tull School of Accounting Terry College of Business

Assessment Plan Undergraduate Major in Accounting J. M. Tull School of Accounting Terry College of Business Assessment Plan Undergraduate Major in Accounting J. M. Tull School of Accounting Terry College of Business The major: Accounting majors prepare for careers in business and accounting and increasingly

More information

Rotherham MBC ANNUAL FRAUD REPORT 2009/10

Rotherham MBC ANNUAL FRAUD REPORT 2009/10 Rotherham MBC ANNUAL FRAUD REPORT 2009/10 ROTHERHAM MBC ANNUAL FRAUD REPORT 2009/10 C O N T E N T S Page INTRODUCTION 2 PERFORMANCE SUMMARY 2 3 THE COUNCIL S ARRANGEMENTS FOR MANAGING THE RISK OF FRAUD

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where there is a risk

More information

Using the ETS Proficiency Profile Test to Meet VSA Requirements Frequently Asked Questions

Using the ETS Proficiency Profile Test to Meet VSA Requirements Frequently Asked Questions Using the ETS Proficiency Profile Test to Meet VSA Requirements Frequently Asked Questions What is the ETS Proficiency Profile? The ETS Proficiency Profile from ETS is an outcomes assessment of four core

More information

Information Technology Services (ITS)

Information Technology Services (ITS) Service Level Agreement Between: Information Technology Services (ITS) And Date: current date 2 Signature Page: This agreement is effective as of the date of mutual signing between Information

More information

211 CMR: DIVISION OF INSURANCE 211 CMR 23.00: AUDITS OF INSURERS BY INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS FOR YEARS ENDING 1991 AND AFTER

211 CMR: DIVISION OF INSURANCE 211 CMR 23.00: AUDITS OF INSURERS BY INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS FOR YEARS ENDING 1991 AND AFTER 211 CMR 23.00: AUDITS OF INSURERS BY INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS FOR YEARS ENDING 1991 AND AFTER Section 23.01: Authority 23.02: Purpose 23.03: Applicability 23.04: Definitions 23.05: Filing

More information

The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011

The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011 The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011 Table of Contents A Short History of SAS 70 Overview of SSAE 16 and ISAE 3402

More information

Intrusion Detection for Grid and Cloud Computing

Intrusion Detection for Grid and Cloud Computing Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type

More information

Avoiding Buyer s Remorse with AML Monitoring Software. Implementing Effective and Efficient AML Transaction Monitoring Systems

Avoiding Buyer s Remorse with AML Monitoring Software. Implementing Effective and Efficient AML Transaction Monitoring Systems Avoiding Buyer s Remorse with AML Monitoring Software Implementing Effective and Efficient AML Transaction Monitoring Systems Overview A well-designed transaction monitoring program is an important pillar

More information